All Research Sponsored By:TechTarget ComputerWeekly.com
-
5G business use cases
5G, the latest generation of cellular technology, delivers faster speeds, lower latency and greater capacity for multiple devices than its 4G predecessor. Although carriers are devoting the lion's share of their 5G marketing dollars to wooing consumers, enterprises will reap the biggest rewards. Here are seven 5G emerging use cases for enterprises.
-
5 steps to follow when migrating MLPS to SD-WAN
Over the past several years of deploying SD-WAN, there's been a shift in the way enterprises move from MPLS to SD-WAN technology. Increasingly, the question has become less about if SD-WAN will be adopted and more about how to shift to SD-WAN. Here are some of the less obvious actions to take to ensure a smooth transition.
-
The evolution of chatbots from ELIZA to Bard
Generative AI's history goes back nine decades. Though developments abound, its progress commercially has been relatively slow -- until recently. In just a matter of months, ChatGPT has catapulted generative AI into the social consciousness. In this infographic, learn about AI's historic milestones and what the future holds for this technology.
-
Is a cloud-first strategy right for you?
The majority of new application development targets public cloud hosting. What's now called cloud-first is already an accepted strategy. It's important to look beyond that to the productivity gains that are driving both cloud and the data center. In this article, learn how to avoid risks and build a strategy that is right for your organization.
-
Quantum computing: What are the data storage challenges?
Quantum computing will process massive amounts of information. But, to be fully effective, quantum computing will need to access, analyse and store huge amounts of data. One area, in particular, will have to deal with significant challenges: data storage. How will today's storage systems keep pace?
-
7 characteristics of next-generation networking
The term next-generation networking refers to the process of designing network infrastructure with new, advanced technologies. Next-generation networks are flexible, nimble and secure architectures that are easier to manage. In this article, analysts offer their perspectives on which technologies help modernize network infrastructures.
-
Data classification tools: What they do and who makes them
Data classification is an essential pre-requisite to data protection, security and compliance. Firms need to know where their data is and the types of data they hold. In this article, learn more about how these tools can help keep your data tidy and which suppliers offer the best options in the market.
-
Securing your software supply chain
Organisations need to have a thorough understanding of software components and build security controls into development lifecycles to shore up the security of their software supply chains. Learn how software supply chain security can combine risk management and cybersecurity to help protect your organisation from potential vulnerabilities.
-
Computer Weekly – 16 May 2023: Microsoft and Google go into battle for enterprise AI
In this week's Computer Weekly, as developments in generative AI accelerate, Microsoft and Google have each unveiled plans around enterprise applications. Nobody doubts the importance of digital transformation – but experts say it won't work without cultural change as well. Read the issue now.
-
Vishing attacks increasing, but AI's role still unclear
According to cybersecurity company Trellix, the number of vishing attacks in Q4 2022 increased by 142% from Q3 2022. Although the volume of vishing attacks continues to rise, threat researchers say that the role of AI technology in these attacks may have been overestimated.
-
CW EMEA - May 2023: The future of work
In this month's CW EMEA, we look at the future of work in Europe after the pandemic forced a change in entrenched human behaviour. We also look at the increasing problem of IT failures in Dutch hospitals and how they are affecting patient care, highlighting the need to improve IT security in hospitals. Read the issue now.
-
Computer Weekly – 2 May 2023: The ethics of military AI
In this week's Computer Weekly, as the defence sector looks into using AI to create autonomous weapons, we examine the risks and ethics of military AI. AWS is under fire for not providing vital emissions data to customers – we investigate. And we find out what IT security teams can learn from cyber warfare in Ukraine. Read the issue now.
-
Computer Weekly – 25 April 2023: Aston Martin Formula One: Driven by data
In this week's Computer Weekly, we speak to Aston Martin Formula One's Clare Lansley to find out how digital transformation helps the team to move further up the F1 grid. We explore how automation and AI is helping businesses tackle rising costs and also look into the maturity of Industry 4.0 initiatives. Read the issue now.
-
Top 14 ransomware targets in 2023 and beyond
According to a 2022 global survey, two in three organizations suffered a ransomware incident in the previous 12 months, up 78% over the previous year. In this article, we take a look at the 14 top ransomware targets by sector, based on the Sophos survey and other data.
-
CW APAC April 2023 – Trend Watch: Business applications
Tech's role in the workplace continues to grow. In this handbook, focused on business applications in the Asia-Pacific region, Computer Weekly looks at industry cloud platforms, how microservices improve customer experience, what automation brings to banking and Rimini Street's approach to third-party support
-
10 data lake uses for enterprises
Data lakes have become an essential tool for the modern data management platform. They provide a scalable and cost-effective platform for storing and managing large volumes of data, and they support real-time data analysis and processing. This infographic highlights ten cases in which data lakes are critical for modern data management.
-
2023 IT Priorities APAC Report
IT leaders across APAC remain bullish about IT spending despite macroeconomic headwinds as they continue to invest in strategic areas such as cyber security, automation and cloud computing to bolster their digital chops.In this e-guide, read more about the findings revealed by the latest TechTarget/Computer Weekly IT Priorities 2023 study.
-
Infographic: IT Priorities 2023 APAC Budget and Buying Patterns
Each year, Computer Weekly asks IT decision-makers what projects they have planned for the coming year and this year's results show that IT leaders across APAC remain bullish about spending despite macroeconomic headwinds as they continue to invest in strategic areas. Download this infographic to find out more about the results.
-
Computer Weekly – 4 April 2023: Revitalising UK digital government
In this week's Computer Weekly, as the UK plummets down the international rankings for digital government, can its £400m identity system revitalise the UK's digital strategy? Read the issue now.
-
Video: IT Priorities 2023 APAC
Over half of respondents in this year's IT Priorities study have bigger IT budgets as they continue to make strategic investments in cyber security, cloud and automation. In this video, hear from TechTarget's APAC editor in chief on the top priorities of organisations and the major tech trends that are shaping IT buying decisions in the region.
-
Will data centers become obsolete?
Many organizations want to simplify or scale down their data centers -- but they won't disappear. Admins can examine as-a-service options and cloud to offload some applications.
-
A Computer Weekly buyer's guide to data visualisation
Data visualisation is proving its value throughout a period of economic uncertainty. In this 16-page buyer’s guide, Computer Weekly looks at the rise of embedded analytics, the advantages of real-time data and Siemens’ exploration of industrial metaverse use cases
-
Computer Weekly – 28 March 2023: Is TikTok really a security threat to your business?
In this week's Computer Weekly, with the UK government becoming the latest administration to ban TikTok, we ask whether the controversial social media app is really a security threat to enterprises. Read the issue now.
-
Centralized vs. decentralized identity management explained
In this article, learn about centralized vs. decentralized identity management, as well as the advantages and disadvantages of each from two viewpoints: organizations that want to verify user identities and individuals that want to access organizations' resources and services.
-
4 ChatGPT cybersecurity benefits for the enterprise
As the technology matures and improves, expect to see the following beneficial ChatGPT cybersecurity use cases emerge in the enterprise.